This year, the Linux kernel turns 31 years old(!), and a lot has changed since its inception in the early 90’s. Linux these days is ubiquitous, being the backbone of the Cloud, many IOT devices, and of course, a large part of the hybrid server estate and with great power, comes the great responsibility to ensure the most security without slowing operators down.
Attackers crave elevated access and enforcing least privilege is a foundational security control to prevent privileged attackers from gaining foothold across any point of entry. CyberArk extends an additional layer of security to enforce least privilege and centralize privilege escalation management in Linux environments with the recent release of Endpoint Privilege Manager (EPM) for Linux.
In this webinar, hear from Brandon Traffanstedt, Sr. Director, Field Technology Office, CyberArk and Cameron Skidmore, Global Partner Solutions Architect, Red Hat as they showcase how:
-CyberArk and Red Hat have partnered together to level up security across enterprise IT environments
-Common security controls can be applied to Linux systems consistently
-CyberArk EPM for Linux extends centralized least privilege to Red Hat Enterprise Linux (RHEL)
-EPM for Linux maximizes risk reduction benefits with minimal resources, allowing organizations to securely scale RHEL deployments to the Cloud and Edge
-See demonstrations in action: certificate signing just-in-time, centralized SUDOers management, and our favorite, mitigation of malicious behavior like elevated shell escapes
Recommended for You
30:39In today’s hybrid enterprise, identities go far beyond employees. Contractors, apps, and even machines all need privileged access — and traditional governance can’t keep up.
15:59Orphaned accounts (inactive or unowned user identities that retain access to critical systems) represent one of the most overlooked security risks in modern enterprises.
37:35Learn how to secure identities across multi-cloud environments, meet global regulations, strengthen resilience, and protect sensitive workloads-all while maintaining speed and innovation.
47:52Learn to secure SaaS sessions with real-time monitoring and protection that won't disrupt your users.
35:04The recent Shai-Hulud npm worm shows how fast an initial compromise can spread when secrets are poorly managed.
22:08Traditional Identity Governance and Administration (IGA) has long relied on static roles and labels—“Software Engineer,” “Sales Rep,” “Manager.” But in today’s dynamic business environment
26:16Learn how CyberArk Workforce Password Management integrates across the Identity Security Platform—and with third-party IdPs, PAM, Secure Web Sessions, and Enterprise Browser.
19:14AI-era apps introduce new MCP vulnerabilities. Discover how to protect endpoints with strong privilege and application controls.
29:09Bridge Linux identity gaps with centralized authentication, least privilege, and Zero Trust-ready controls.
29:09Build a stronger endpoint defense-in-depth strategy by breaking down silos and securing identities at every layer.
23:45In this session, CyberArk demonstrates how Secure Web Sessions (SWS) provides complete, audit-ready visibility and control over workforce web activity, helping organizations close compliance gaps,
35:38The Future of Privilege: Proven PAM foundations and modern access controls combined in one platform for today’s hybrid enterprise.
32:25CyberArk's Deepak Taneja on why these are not just compliance exercises.
46:08In the fast-moving world of DevOps, cloud, and machine identities, secrets are everywhere—and attackers know it.
1:00:34Secure agentic AI with identity security and least privilege. Learn risks, research, and solutions in this expert-led virtual event.
37:45The Future of Privilege is here. Discover how to evolve your current infrastructure with Just-in-Time access, and Zero Standing Privilege.
1:01:26Experts unpack best practices and pitfalls to avoid when trying to manage multiple clouds at once
31:00Discover who’s really in your cloud—and how to protect developer and data scientist identities without slowing innovation.
28:32Join CyberArk experts Uzi (VP, Machine Identity Solutions) and Darren (Senior Product Manager) to learn how to eliminate secrets vault sprawl and unify governance across your organization.
29:53Learn why enterprises are replacing legacy app control with least privilege to boost security, efficiency, and compliance.



